Cybercrime threat intelligence: A systematic multi-vocal literature review
Published 2021 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Cybercrime threat intelligence: A systematic multi-vocal literature review
Authors
Keywords
Cyber threat intelligence, Cybersecurity, Dark web, Deep web, Surface web, Topic modelling
Journal
COMPUTERS & SECURITY
Volume 105, Issue -, Pages 102258
Publisher
Elsevier BV
Online
2021-03-06
DOI
10.1016/j.cose.2021.102258
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- The Privacy Implications of Cyber Security Systems
- (2018) Eran Toch et al. ACM COMPUTING SURVEYS
- Systematically Understanding the Cyber Attack Business
- (2018) Keman Huang et al. ACM COMPUTING SURVEYS
- A survey on technical threat intelligence in the age of sophisticated cyber attacks
- (2018) Wiem Tounsi et al. COMPUTERS & SECURITY
- Big Data Framework for Zero-Day Malware Detection
- (2018) Deepak Gupta et al. CYBERNETICS AND SYSTEMS
- The Pains and Gains of Microservices: A Systematic Grey Literature Review
- (2018) Jacopo Soldani et al. JOURNAL OF SYSTEMS AND SOFTWARE
- Detection of slow port scans in flow-based network traffic
- (2018) Markus Ring et al. PLoS One
- Linking Multiple Online Identities in Criminal Investigations: A Spectral Co-Clustering Framework
- (2017) Xiaohui Han et al. IEEE Transactions on Information Forensics and Security
- Data and Decision Intelligence for Human-in-the-Loop Cyber-Physical Systems: Reference Model, Recent Progresses and Challenges
- (2017) Meng Ma et al. Journal of Signal Processing Systems for Signal Image and Video Technology
- A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing
- (2016) Florian Skopik et al. COMPUTERS & SECURITY
- Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization
- (2016) Claude Fachkha et al. IEEE Communications Surveys and Tutorials
- Mitigating Risk with Cyberinsurance
- (2015) Per Hakon Meland et al. IEEE SECURITY & PRIVACY
- Analyzing and defending against web-based malware
- (2013) Jian Chang et al. ACM COMPUTING SURVEYS
- EVOLVING INSIDER THREAT DETECTION STREAM MINING PERSPECTIVE
- (2013) PALLABI PARVEEN et al. International Journal on Artificial Intelligence Tools
- IP traceback with sparsely-tagged fragment marking scheme under massively multiple attack paths
- (2011) Kichang Kim et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- Intelligence Analyses and the Insider Threat
- (2011) Eugene Santos et al. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS
- Mitigation of malicious attacks on networks
- (2011) C. M. Schneider et al. PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA
- Systematic literature reviews in software engineering – A systematic literature review
- (2008) Barbara Kitchenham et al. INFORMATION AND SOFTWARE TECHNOLOGY
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationAdd your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload Now